No abstract available.
Proceeding Downloads
A Comparative Study of ML-ELM and DNN for Intrusion Detection
Intrusion detection remains one of the critical research issues in network security. Many machine learning algorithms have been proposed to develop intrusion detection systems, which can categorize network traffic into normal and anomalous classes. The ...
Barriers and Incentives to Cybersecurity Threat Information Sharing in Developing Countries: A Case Study of Saudi Arabia
Threat information sharing practices have the potential to improve cyber security. However, participation in sharing communities is not widely adopted. The existing literature finds a variety of benefits and challenges that either promote or deter ...
A Survey on Formal Verification for Solidity Smart Contracts
One of the 21st century’s hottest topics in the world of IT has been the emergence of what some predict to be the foundation stone for a new era of internet (web 3.0): Blockchain technology. Besides being the backbone of what we come to know as ...
A Framework for Determining Robust Context-Aware Attack-Detection Thresholds for Cyber-Physical Systems
Process-aware attack detection plays a key role in securing cyber-physical systems. A process-aware detection system (PADS) identifies a baseline behaviour of the physical process in cyber-physical systems and continuously attempts to detect deviations ...
A snapshot analysis of publicly available BYOD policies
Bring your own device (BYOD) is the practice of bringing an individual’s own technology into the organisation for use in that environment. BYOD has become more commonplace in 2020 as a result of the COVID19 pandemic, as employees work from home, often ...
FEPAC: A Framework for Evaluating Parallel Algorithms on Cluster Architectures
For many years, computer scientists have explored the computing power of so-called computing clusters to address performance requirements of computationally intensive tasks. Historically, computing clusters have been optimized with run-time performance ...
SIMDify: Framework for SIMD-Processing with RISC-V Scalar Instruction Set
In this work, we propose a parallel programming framework, SIMDify, which generates single-instruction-multiple-data (SIMD) processors that can achieve SIMD processing without using SIMD instructions. SIMDify takes an application machine code compiled ...
A Traffic and Resource Aware Online Storm Scheduler
Streaming applications have become widespread with the advent of big data and IoT. They are latency-sensitive applications that aim to process vast amounts of data in near real time. They are usually modelled as directed graphs and their deployment and ...
Modeling and Emulation of an Osmotic Computing Ecosystem using OsmoticToolkit
Digital services are increasingly becoming cyber-physical and osmotic, combining Cloud resources with Fog, Edge, and IoT devices. This trend can be observed in the e-health domain or in smart city applications where the location of software deployments ...
Serverless Edge Computing: Vision and Challenges
- Mohammad S. Aslanpour,
- Adel N. Toosi,
- Claudio Cicconetti,
- Bahman Javadi,
- Peter Sbarski,
- Davide Taibi,
- Marcos Assuncao,
- Sukhpal Singh Gill,
- Raj Gaire,
- Schahram Dustdar
Born from a need for a pure “pay-per-use” model and highly scalable platform, the “Serverless” paradigm emerged and has the potential to become a dominant way of building cloud applications. Although it was originally designed for cloud environments, ...
Tour de Tune 2 - Auditory-Game-Motor Synchronisation with Music Tempo in an Immersive Virtual Reality Exergame
Physical activity has numerous benefits, but a large proportion of the population do not exercise enough. Exergaming, the combination of exercises and gaming, has been suggested as a means to increase physical activity for people not intrinsically ...
Establishing a Dialog Agent Policy using Deep Reinforcement Learning in the Psychotherapy Domain
Recent years have seen a rise in the development and use of dialog agents (chatbots) including as personal friends, coaches and even counsellors (Virtual Counsellor, VC). Some of these [1] employ expert psychotherapy techniques, notably Cognitive ...
Handling uncertainty using features from pathology: opportunities in primary care data for developing high risk cancer survival methods
More than 144 000 Australians were diagnosed with cancer in 2019. Diagnosing cancer in primary care is challenging due to the non-specific nature of cancer symptoms and its low prevalence. Understanding the epidemiology of cancer symptoms and patterns ...
On the Importance of Diversity in Re-Sampling for Imbalanced Data and Rare Events in Mortality Risk Models
Surgical risk increases significantly when patients present with comorbid conditions. This has resulted in the creation of numerous risk stratification tools with the objective of formulating associated surgical risk to assist both surgeons and patients ...
Targeted Health Information Delivery Framework: Evaluation and Feedback from Potential Client End-users
This paper describes the evaluation completed on a targeted health information delivery system from the perspective of potential client-type end-users. The system was created as a tool for Healthcare Practitioners (HCPs) to evaluate their clients and ...
Melanoma classification using EfficientNets and Ensemble of models with different input resolution
Early and accurate detection of melanoma with data analytics can make treatment more effective. This paper proposes a method to classify melanoma cases using deep learning on dermoscopic images. The method demonstrates that heavy augmentation during ...
Open Banking and Electronic Health Records
The Open Banking model is a data sharing model emerging in financial services sector that involves technological and regulatory innovations designed to facilitate access to banking records by third party providers such as payment service providers. The ...
A comparative analysis of sepsis digital phenotyping methods
Health data captured in Electronic health records (EHRs) have enabled the development of computational approaches to improve patient management and treatment, including early diagnosis of severe conditions such as sepsis. The validity of these efforts, ...
Classifying infective keratitis using a deep learning approach
Early diagnosis of infective keratitis is critical as it is a vision-threatening condition that can lead to significant vision loss and ocular morbidity. Diagnosis of infective keratitis done through clinical findings and slit- lamp examination is ...
Evaluation of Channel Performance in Seizure Prediction
Since unprovoked seizures are identified as the biggest concern of epileptic patients, an effective seizure prediction device is definitely a game changer in epilepsy management. In order to apply seizure prediction in practical settings, seizure ...
Who am I? - Development and Analysis of an Interactive 3D Game for Psychometric Testing
Psychometric testing has become a popular scientific method to measure individuals’ mental capabilities and behavioural styles. Traditional psychometric tests are standardised and usually require the completion of paper forms. This means they are ...
Observing the Stroop Effect within a First Person Shooter Concept
Following the digitisation of the classic Stroop Colour and Word Test, a set of scenarios have been produced in a game engine using a First Person Shooter (FPS) video-game format to determine whether the Stroop effect is replicable, specifically in the ...
Archetypal Analysis Based Anomaly Detection for Improved Storytelling in Multiplayer Online Battle Arena Games
- Rafet Sifa,
- Anders Drachen,
- Florian Block,
- Spencer Moon,
- Anisha Dubhashi,
- Hao Xiao,
- Zili Li,
- Diego Klabjan,
- Simon Demediuk
Anomalies in esports refer to situations when something unexpected or unlikely happens. Rapid performance changes, unusual strategies, extraordinary plays, accelerated resource gains or team wipeouts comprise examples, but anomalies fundamentally ...
Gender Differences when Adopting Avatars for Educational Games
Avatars act as digital representations of players or non-playing characters in games and other online environments, and also play a key role key in educational games. This study looks at gender differences that may impact on human avatar interactions, ...
Player Motivation in Therapy Games for Parkinson's Disease: A Scoping Review: Understanding meaningful play, self-determination and flow
Good games are engaging for the right audience. They compel their players to come back and play, motivate their participation with meaningful moment-to-moment actions (meaningful play), help them develop a long-term engagement (self-determination), and ...
Application of Graphs for Story Generation in Video Games
The paper presents the system based on the layered hierarchical graphs for game plot description implemented in Godot Engine using the JSON format. The aim of the presented research is to create a tool that both supports the decision-making process and ...
Index Terms
- Proceedings of the 2021 Australasian Computer Science Week Multiconference
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ACSW '19 | 141 | 61 | 43% |
Overall | 141 | 61 | 43% |